A novel Intrusion Detection System for Vehicular Ad Hoc Networks (VANETs) based on differences of traffic flow and position
暂无分享,去创建一个
F. Richard Yu | Jianyong Chen | Yingying Zhu | Junwei Liang | F. Yu | Yingying Zhu | Jianyong Chen | Junwei Liang
[1] Zhong Ming,et al. An improved NSGA-III algorithm for feature selection used in intrusion detection , 2017, Knowl. Based Syst..
[2] Al-Sakib Khan Pathan. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .
[3] Xiaohui Liang,et al. Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.
[4] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[5] Victor I. Chang,et al. Big data analytics for mitigating broadcast storm in Vehicular Content Centric networks , 2017, Future Gener. Comput. Syst..
[6] Shi-Jinn Horng,et al. Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs , 2017, IEEE Transactions on Vehicular Technology.
[7] Dijiang Huang,et al. Guest Editors' Introduction: Special Issue on Reliable and Secure VANETs , 2016, IEEE Trans. Dependable Secur. Comput..
[8] Shihao Yan,et al. Optimal Information-Theoretic Wireless Location Verification , 2012, IEEE Transactions on Vehicular Technology.
[9] Mohsen Guizani,et al. A lightweight privacy-preserving protocol using chameleon hashing for secure vehicular communications , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[10] Vijay Varadharajan,et al. Intrusion detection techniques in cloud environment: A survey , 2017, J. Netw. Comput. Appl..
[11] Naveen K. Chilamkurti,et al. Collaborative trust aware intelligent intrusion detection in VANETs , 2014, Comput. Electr. Eng..
[12] Sami Muhaidat,et al. Cooperative cross layer detection for blackhole attack in VANET-OLSR , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).
[13] Muttukrishnan Rajarajan,et al. Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection , 2016, IEEE Transactions on Vehicular Technology.
[14] Pietro Manzoni,et al. Evaluating the Usefulness of Watchdogs for Intrusion Detection in VANETs , 2010, 2010 IEEE International Conference on Communications Workshops.
[15] Mosa Ali Abu-Rgheff,et al. An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks , 2014, IEEE Internet of Things Journal.
[16] Dijiang Huang,et al. PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs , 2011, IEEE Transactions on Intelligent Transportation Systems.
[17] Sidi-Mohammed Senouci,et al. An accurate and efficient collaborative intrusion detection framework to secure vehicular networks , 2015, Comput. Electr. Eng..
[18] Sidi-Mohammed Senouci,et al. A distributed detection and prevention scheme from malicious nodes in vehicular networks , 2016, Int. J. Commun. Syst..
[19] Bo Yu,et al. Detecting Sybil attacks in VANETs , 2013, J. Parallel Distributed Comput..
[20] Chinnappan Jayakumar,et al. Trust based authentication technique for cluster based vehicular ad hoc networks (VANET) , 2018, Wirel. Networks.
[21] Sidi-Mohammed Senouci,et al. Detection and prevention from misbehaving intruders in vehicular networks , 2014, 2014 IEEE Global Communications Conference.
[22] Klaus D. McDonald-Maier,et al. On the detection of grey hole and rushing attacks in self-driving vehicular networks , 2015, 2015 7th Computer Science and Electronic Engineering Conference (CEEC).
[23] Andreas Rauber,et al. The growing hierarchical self-organizing map: exploratory analysis of high-dimensional data , 2002, IEEE Trans. Neural Networks.
[24] Ivan Stojmenovic,et al. Data-centric Misbehavior Detection in VANETs , 2011, ArXiv.
[25] Nirbhay Chaubey,et al. Security Analysis of Vehicular Ad Hoc Networks (VANETs): A Comprehensive Study , 2016 .
[26] Jamal Bentahar,et al. CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks , 2016, Expert Syst. Appl..
[27] Jalel Ben-Othman,et al. DJAVAN: Detecting jamming attacks in Vehicle Ad hoc Networks , 2015, Perform. Evaluation.
[28] Hao Hu,et al. REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET , 2017, IEEE Transactions on Vehicular Technology.
[29] Hassan Artail,et al. A Framework for Secure and Efficient Data Acquisition in Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Vehicular Technology.
[30] Teuvo Kohonen,et al. The self-organizing map , 1990, Neurocomputing.
[31] Sherali Zeadally,et al. Trust-based security adaptation mechanism for Vehicular Sensor Networks , 2018, Comput. Networks.
[32] Sushanta Karmakar,et al. A game theory based multi layered intrusion detection framework for VANET , 2018, Future Gener. Comput. Syst..
[33] Antonino Staiano,et al. Machine learning and soft computing for ICT security: an overview of current trends , 2011, Journal of Ambient Intelligence and Humanized Computing.
[34] Wenjia Li,et al. ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[35] Sidi-Mohammed Senouci,et al. An efficient intrusion detection framework in cluster-based wireless sensor networks , 2013, Secur. Commun. Networks.
[36] Nirwan Ansari,et al. Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology , 2017, IEEE Transactions on Intelligent Transportation Systems.
[37] Ajay Kaul,et al. Hybrid fuzzy multi-criteria decision making based multi cluster head dolphin swarm optimized IDS for VANET , 2018, Veh. Commun..